clone the flipper repo
git clone [email protected]:flipperdevices/flipperzero-firmware.git
download the build tools requirements
pip3 install -r scripts/requirements.txt
cd applications/plugins
clone the flipper repo
git clone [email protected]:flipperdevices/flipperzero-firmware.git
download the build tools requirements
pip3 install -r scripts/requirements.txt
cd applications/plugins
<!DOCTYPE html> | |
<html> | |
<head> | |
<meta charset="utf-8"> | |
<meta name="viewport" content="width=device-width"> | |
<title>Paxton Fob converter</title> | |
<style> | |
table, th, td, div { | |
border: 1px solid black; | |
} |
A newer version of this info is available at https://badcfe.org/how-to-paxton-with-rfidler/
Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring:
Paxton readers often look like this:
import re, random, operator | |
random.seed() | |
def get_random_int(): | |
return random.randint(1,999) | |
def to_soroban(number): | |
digits = { | |
0: "**** || *", | |
1: "*** *|| *", |
import random, operator | |
random.seed() | |
def get_random_int(): | |
return random.randint(2, 12) | |
numberOfQs = 10 | |
ops = {"+": operator.add, | |
"-": operator.sub, | |
"*": operator.mul, |
/* | |
* | |
*/ | |
#include <stdio.h> | |
#include <math.h> | |
#define MODMULT(a, b, c, m, s) q = s/a;s=b*(s-a*q)-c*q;if(s<0)s+=m; | |
/* MODMULT computes s*b mod m, provided that m=a*b+c and 0<=c<m */ |
<?php | |
class Lcg | |
{ | |
private $s1 = 0; | |
private $s2 = 0; | |
public function __construct($s1, $s2) | |
{ | |
$this->s1 = $s1; |
<?php | |
class MersenneTwister | |
{ | |
const STANDARD = 1; | |
const PHP = 2; | |
// Create a length 624 array to store the state of the generator | |
private $MT; |
$time = time(0); | |
$pid = getmypid(); | |
echo 'time is: ',$time,' (just the unix timestamp so very guessable)',PHP_EOL; | |
echo 'pid is: ',$pid, ' (process id of current PHP process usually in 1000s )',PHP_EOL; | |
$rand = mt_rand(); | |
echo 'Output of 1st call to uninitialized to mt_rand is: '.$rand,PHP_EOL; | |
echo 'Output of 2nd call to uninitialized to mt_rand is: '.mt_rand(),PHP_EOL; | |
echo 'Output of 3rd call to uninitialized to mt_rand is: '.mt_rand(),PHP_EOL; | |
echo 'Guessing the seed now: ',PHP_EOL; |
import random | |
from Ecc import Ecc | |
from Ecc import Point | |
A = -95051 | |
B = 11279326 | |
p = 233970423115425145524320034830162017933 | |
q = 233970423115425145498902418297807005944 | |
ecc = Ecc(A, B, p) |